Lines Matching full:aka
2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
285 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) in eap_aka_prime_derive_keys()
296 prf_prime(key, "EAP-AKA'", identity, identity_len, NULL, 0, in eap_aka_prime_derive_keys()
301 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr", in eap_aka_prime_derive_keys()
306 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_aut", in eap_aka_prime_derive_keys()
311 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re", in eap_aka_prime_derive_keys()
316 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN); in eap_aka_prime_derive_keys()
320 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys()
333 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S) in eap_aka_prime_derive_keys_reauth()
341 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len, in eap_aka_prime_derive_keys_reauth()
347 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN); in eap_aka_prime_derive_keys_reauth()
351 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN); in eap_aka_prime_derive_keys_reauth()
383 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", in eap_sim_verify_mac_sha256()
385 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data", in eap_sim_verify_mac_sha256()
387 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA': Verify MAC - K_aut", in eap_sim_verify_mac_sha256()
390 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC: MAC", in eap_sim_verify_mac_sha256()
412 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len); in eap_sim_add_mac_sha256()
413 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - extra data", in eap_sim_add_mac_sha256()
415 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA': Add MAC - K_aut", in eap_sim_add_mac_sha256()
419 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC: MAC", in eap_sim_add_mac_sha256()
439 * AKA procedure with network name passed in there and option to use in eap_aka_prime_derive_ck_ik_prime()
457 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime()
458 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
459 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
460 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime()
461 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': P0 = Access network identity", in eap_aka_prime_derive_ck_ik_prime()
463 wpa_hexdump(MSG_DEBUG, "EAP-AKA': P1 = SQN xor AK", sqn_ak, 6); in eap_aka_prime_derive_ck_ik_prime()
467 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': Key = CK || IK", in eap_aka_prime_derive_ck_ik_prime()
484 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')", in eap_aka_prime_derive_ck_ik_prime()
489 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LEN); in eap_aka_prime_derive_ck_ik_prime()
490 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN); in eap_aka_prime_derive_ck_ik_prime()
496 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument
535 if ((!aka && (alen % GSM_RAND_LEN)) || in eap_sim_parse_attr()
536 (aka && alen != EAP_AKA_RAND_LEN)) { in eap_sim_parse_attr()
546 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTN"); in eap_sim_parse_attr()
547 if (!aka) { in eap_sim_parse_attr()
555 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr()
636 if (aka) { in eap_sim_parse_attr()
637 wpa_printf(MSG_DEBUG, "EAP-AKA: " in eap_sim_parse_attr()
795 if (!aka || alen < EAP_AKA_MIN_RES_LEN || in eap_sim_parse_attr()
806 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTS"); in eap_sim_parse_attr()
807 if (!aka) { in eap_sim_parse_attr()
813 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTS" in eap_sim_parse_attr()
821 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_CHECKCODE"); in eap_sim_parse_attr()
822 if (!aka) { in eap_sim_parse_attr()
831 wpa_printf(MSG_INFO, "EAP-AKA: Invalid " in eap_sim_parse_attr()
856 if (aka != 2) { in eap_sim_parse_attr()
857 wpa_printf(MSG_INFO, "EAP-AKA: Unexpected " in eap_sim_parse_attr()
862 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF_INPUT"); in eap_sim_parse_attr()
867 wpa_printf(MSG_INFO, "EAP-AKA': Invalid " in eap_sim_parse_attr()
878 if (aka != 2) { in eap_sim_parse_attr()
879 wpa_printf(MSG_INFO, "EAP-AKA: Unexpected " in eap_sim_parse_attr()
884 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF"); in eap_sim_parse_attr()
886 wpa_printf(MSG_INFO, "EAP-AKA': Invalid " in eap_sim_parse_attr()
892 wpa_printf(MSG_DEBUG, "EAP-AKA': Too many " in eap_sim_parse_attr()
900 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_BIDDING"); in eap_sim_parse_attr()
902 wpa_printf(MSG_INFO, "EAP-AKA: Invalid " in eap_sim_parse_attr()
927 "(aka=%d encr=%d)", aka, encr); in eap_sim_parse_attr()
935 struct eap_sim_attrs *attr, int aka) in eap_sim_parse_encr() argument
961 aka, 1)) { in eap_sim_parse_encr()
1170 void eap_sim_report_notification(void *msg_ctx, int notification, int aka) in eap_sim_report_notification() argument
1173 const char *type = aka ? "AKA" : "SIM"; in eap_sim_report_notification()